注意:原文中第3個方法“檢測并不應該native的native方法”沒有實作。
檢測代碼如下:
import java.io.BufferedReader;
import java.io.FileReader;
import java.util.HashSet;
import java.util.List;
import java.util.Set;
import android.content.Context;
import android.content.pm.ApplicationInfo;
import android.content.pm.PackageManager;
import android.util.Log;
public class FindHook {
private static boolean findHookAppName(Context context) {
PackageManager packageManager = context.getPackageManager();
List<ApplicationInfo> applicationInfoList = packageManager
.getInstalledApplications(PackageManager.GET_META_DATA);
for (ApplicationInfo applicationInfo : applicationInfoList) {
if (applicationInfo.packageName.equals("de.robv.android.xposed.installer")) {
Log.wtf("HookDetection", "Xposed found on the system.");
return true;
}
if (applicationInfo.packageName.equals("com.saurik.substrate")) {
Log.wtf("HookDetection", "Substrate found on the system.");
return true;
}
}
return false;
}
private static boolean findHookAppFile() {
try {
Set<String> libraries = new HashSet<String>();
String mapsFilename = "/proc/" + android.os.Process.myPid() + "/maps";
BufferedReader reader = new BufferedReader(new FileReader(mapsFilename));
String line;
while ((line = reader.readLine()) != null) {
if (line.endsWith(".so") || line.endsWith(".jar")) {
int n = line.lastIndexOf(" ");
libraries.add(line.substring(n + 1));
}
}
reader.close();
for (String library : libraries) {
if (library.contains("com.saurik.substrate")) {
Log.wtf("HookDetection", "Substrate shared object found: " + library);
return true;
}
if (library.contains("XposedBridge.jar")) {
Log.wtf("HookDetection", "Xposed JAR found: " + library);
return true;
}
}
} catch (Exception e) {
Log.wtf("HookDetection", e.toString());
}
return false;
}
// 1. 如果存在Xposed架構hook
// (1)在dalvik.system.NativeStart.main方法後出現de.robv.android.xposed.XposedBridge.main調用
// (2)如果Xposed hook了調用棧裡的一個方法,
// 還會有de.robv.android.xposed.XposedBridge.handleHookedMethod
// 和de.robv.android.xposed.XposedBridge.invokeOriginalMethodNative調用
// 2. 如果存在Substrate架構hook
// (1)dalvik.system.NativeStart.main調用後會出現2次com.android.internal.os.ZygoteInit.main,而不是一次。
// (2)如果Substrate hook了調用棧裡的一個方法,
// 還會出現com.saurik.substrate.MS$2.invoked,com.saurik.substrate.MS$MethodPointer.invoke還有跟Substrate擴充相關的方法
private static boolean findHookStack() {
try {
throw new Exception("findhook");
} catch (Exception e) {
// 讀取棧資訊
// for(StackTraceElement stackTraceElement : e.getStackTrace()) {
// Log.wtf("HookDetection", stackTraceElement.getClassName() + "->"+
// stackTraceElement.getMethodName());
// }
int zygoteInitCallCount = 0;
for (StackTraceElement stackTraceElement : e.getStackTrace()) {
if (stackTraceElement.getClassName().equals("com.android.internal.os.ZygoteInit")) {
zygoteInitCallCount++;
if (zygoteInitCallCount == 2) {
Log.wtf("HookDetection", "Substrate is active on the device.");
return true;
}
}
if (stackTraceElement.getClassName().equals("com.saurik.substrate.MS$2")
&& stackTraceElement.getMethodName().equals("invoked")) {
Log.wtf("HookDetection", "A method on the stack trace has been hooked using Substrate.");
return true;
}
if (stackTraceElement.getClassName().equals("de.robv.android.xposed.XposedBridge")
&& stackTraceElement.getMethodName().equals("main")) {
Log.wtf("HookDetection", "Xposed is active on the device.");
return true;
}
if (stackTraceElement.getClassName().equals("de.robv.android.xposed.XposedBridge")
&& stackTraceElement.getMethodName().equals("handleHookedMethod")) {
Log.wtf("HookDetection", "A method on the stack trace has been hooked using Xposed.");
return true;
}
}
}
return false;
}
public static boolean isHook(Context context) {
if (findHookAppName(context) || findHookAppFile() || findHookStack()) {
return true;
}
return false;
}
}
檢測繞過的方法
對應如下:
hook PackageManager的getInstalledApplications,把Xposed或者Substrate的包名去掉
hook Exception的getStackTrace,把自己的方法去掉
hook 打開的檔案的操作,傳回/dev/null或者修改的map檔案
原文連結:https://blog.csdn.net/u012131859/article/details/51612641
參考原文 http://d3adend.org/blog/?p=589
參考翻譯 http://drops.wooyun.org/tips/16356